US11582032B2 - System and method for sharing user preferences without having the user reveal their identity - Google Patents
System and method for sharing user preferences without having the user reveal their identity Download PDFInfo
- Publication number
- US11582032B2 US11582032B2 US17/018,273 US202017018273A US11582032B2 US 11582032 B2 US11582032 B2 US 11582032B2 US 202017018273 A US202017018273 A US 202017018273A US 11582032 B2 US11582032 B2 US 11582032B2
- Authority
- US
- United States
- Prior art keywords
- user
- key
- preferences
- unique
- secret
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 238000000034 method Methods 0.000 title claims abstract description 58
- 238000012545 processing Methods 0.000 claims abstract description 8
- 230000015654 memory Effects 0.000 claims description 37
- 230000006870 function Effects 0.000 claims description 28
- 238000004590 computer program Methods 0.000 claims description 7
- 210000001525 retina Anatomy 0.000 claims description 5
- 210000003462 vein Anatomy 0.000 claims description 5
- 230000008569 process Effects 0.000 description 19
- 230000000694 effects Effects 0.000 description 8
- 238000004891 communication Methods 0.000 description 5
- 230000008859 change Effects 0.000 description 3
- 230000006855 networking Effects 0.000 description 3
- 230000004888 barrier function Effects 0.000 description 2
- 230000010267 cellular communication Effects 0.000 description 2
- 235000020803 food preference Nutrition 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 208000019901 Anxiety disease Diseases 0.000 description 1
- 230000036506 anxiety Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 235000014510 cooky Nutrition 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
- G06F7/588—Random number generators, i.e. based on natural stochastic processes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
Definitions
- the present subject matter described herein in general, relates to a system and a method for sharing user preferences. More specifically, the present subject matter discloses the system and method for sharing user preferences with business entities, pertaining to one or more products, without having the user reveal their identity.
- software applications often collect more personal information from users than is needed to provide the application's functionality. This information may be misused by these software applications for targeted advertising.
- the information captured by these software applications is used to run advertising campaigns targeted at social media audience cohorts whose attributes are extrapolated from their online activity. This may include the web searches they perform, the content they consume, and the social media posts they engage with.
- This method poses several limitations.
- the search and social media platforms that track users' activity often have access to users' identity.
- social media platforms mask their users' identity from advertisers and developers, there is a massive burden on the social media platforms to protect their users' identity and keep it hidden from advertisers and developers at all times. More importantly, users' identity is not hidden from the platforms themselves, thereby creating an exception for the platforms in respect of the rule applied to the advertisers that no single entity should have access to people's identity as well as activity.
- ecommerce businesses such as AmazonTM and eBayTM capture users' activity data on one product platform and apply it to other products using shared cookies.
- Businesses may continue to target users in their advertisements even if they no longer have the attributes they are being targeted for.
- users' identities on the internet are stored on a network server.
- the server requires resources to host users' identities, keep them secure, and perform regular maintenance. Users do not always have control over their digital identity stored on the server. Every identity on the server does not necessarily correspond to a unique person. In the existing art there is no known way to prevent the storage of identities. People need to manage credentials to access their own identities on the servers.
- Single Sign-On mechanisms such as OAUTH and SAML are used.
- the Single Sign-on mechanism allows applications to use tokens and transfer the burden of authentication to federated identity providers such as GoogleTM and AppleTM.
- personally identifiable information such as name, email, profile photo, etc.
- This reintroduces vulnerabilities in the client application and negates the separation of identity authentication in the first place.
- the third-party authentication system is still susceptible to the same security challenges and all weaknesses are passed on downstream.
- Another technique adopted for security is two-factor authentication.
- Two-factor authentication can be enabled in order to provide an additional layer of security.
- One method is by sending a code over email or text message.
- Another method of two-factor authentication is enabled by generating a code via a separate authentication application, it assumes that the user has control over that authentication application. If the user loses access to the authenticator application, they lose access to their identity manager. Yet another method of two-factor authentication is enabled by having the user remember a pass-phrase, a visual shape, or answers that they made up for a number of personal questions, or any variant thereof. This usually results in an unreasonable barrier for the user and a bad user experience.
- a system for sharing user preferences, pertaining to one or more products, without having the user reveal their identity is illustrated in accordance with an embodiment of the invention.
- the system comprises a processor and a memory coupled to the process.
- the processor is configured to execute program instructions stored in the memory for registering a user.
- the processor may execute program instructions stored in the memory to receive a set of biometric samples of the user corresponding to one or more biometric factors, process the set of biometric samples to compute a Secret-Key (S 1 ) corresponding to the user, generate a Unique-Number (N 1 ) using a random number generation algorithm, apply a Function (F 1 ) to the Secret-Key (S 1 ) and the Unique-Number (N 1 ) to compute a Public-Key (P 1 ), capture a set of attributes and preferences of the user pertaining to a category of products associated with one or more business categories, store the Unique-Number (N 1 ) on a user device and in a data repository, store the set of attributes and preferences in the data repository, and store the Public-Key (P 1 ) on the user device and in a peer-to-peer distributed hash-table.
- F 1 Function
- F 1 Function
- P 1 Public-Key
- the processor may execute program instructions stored in the memory to authenticate the user.
- the processor may execute program instructions stored in the memory to receive a biometric sample captured from the user in real-time, process the biometric sample to generate a Secret-Key (S 2 ), fetch the Public-Key (P 1 ) corresponding to the user from the user device, and compute a Real-Time-Unique-Number (N 2 ) using the Public-Key (P 1 ), the Secret-Key (S 2 ) and the Function (F 1 ). Based on the comparison of the Real-Time-Unique-Number (N 2 ) with the Unique-Number (N 1 ) stored on the user device, the user is authenticated.
- the processor may execute program instructions stored in the memory to recommend to the user, a candidate product from a product catalog associated with a business entity, based on the set of attributes and preferences associated with the user.
- a method for sharing user preferences, pertaining to one or more products, without having the user reveal their identity is illustrated in accordance with an embodiment of the invention.
- the method may comprise one or more steps for registering a user.
- a processor may execute program instructions stored in a memory to receive a set of biometric samples of the user corresponding to one or more biometric factors, process the set of biometric samples to compute a Secret-Key (S 1 ) corresponding to the user, generate a Unique-Number (N 1 ) using a random number generation algorithm, apply a Function (F 1 ) to the Secret-Key (S 1 ) and the Unique-Number (N 1 ) to compute a Public-Key (P 1 ), capture a set of attributes and preferences of the user pertaining to a category of products associated with one or more business categories, store the Unique-Number (N 1 ) on a user device and in a data repository, store the set of attributes and preferences in the data repository, and store the Public-
- the method may comprise one or more steps for authenticating the user.
- the processor may execute program instructions stored in the memory to receive a biometric sample captured from the user in real-time, process the biometric sample to generate a Secret-Key (S 2 ), fetch the Public-Key (P 1 ) corresponding to the user from the user device, and compute a Real-Time-Unique-Number (N 2 ) using the Public-Key (P 1 ), the Secret-Key (S 2 ) and the Function (F 1 ). Based on the comparison of the Real-Time-Unique-Number (N 2 ) with the Unique-Number (N 1 ) stored on the user device the user is authenticated.
- the method may further comprise one or more steps to recommend to the user, a candidate product from a product catalog associated with a business entity, based on the set of attributes and preferences associated with the user.
- a computer program product having a processor and a non-transitory, machine-readable storage medium for sharing user preferences, pertaining to one or more products, without having the user reveal their identity is illustrated in accordance with an embodiment of the present invention.
- the computer program product comprises a program code for registering a user.
- a processor may execute the program code to receive a set of biometric samples of the user corresponding to one or more biometric factors, process the set of biometric samples to compute a Secret-Key (S 1 ) corresponding to the user, generate a Unique-Number (N 1 ) using a random number generation algorithm, apply a Function (F 1 ) to the Secret-Key (S 1 ) and the Unique-Number (N 1 ) to compute a Public-Key (P 1 ), capture a set of attributes and preferences of the user pertaining to a category of products associated with one or more business categories, store the Unique-Number (N 1 ) on a user device and in a data repository, store the set of attributes and preferences in the data repository, and store the Public-Key (P 1 ) on the user device and in a peer-to-peer distributed hash-table.
- the computer program product may comprise a program code for authenticating the user.
- the processor may execute the program code to receive a biometric sample captured from the user in real-time, process the biometric sample to generate a Secret-Key (S 2 ), fetch the Public-Key (P 1 ) corresponding to the user from the user device 103 , and compute a Real-Time-Unique-Number (N 2 ) using the Public-Key (P 1 ), the Secret-Key (S 2 ) and the Function (F 1 ).
- the computer program product comprises a program code to recommend to the user a candidate product from a product catalog associated with a business entity, based on the set of attributes and preferences associated with the user.
- FIG. 1 illustrates a network implementation 100 of a system 101 for sharing user preferences, in accordance with an embodiment of the present disclosure.
- FIG. 2 illustrates components of the system 101 for sharing user preferences, in accordance with an embodiment of the present disclosure.
- FIG. 3 illustrates a method 300 for sharing user preferences, pertaining to one or more products, without having the user reveal their identity, in accordance with an embodiment of the present disclosure.
- FIG. 4 illustrates a method 400 for user registration, in accordance with an embodiment of the present disclosure.
- FIG. 5 illustrates a method 500 for user authentication, in accordance with an embodiment of the present disclosure.
- FIG. 6 illustrates a method 600 for business registration and targeted product promotion without having the user reveal their identity, in accordance with an embodiment of the present disclosure.
- the system 101 may comprise a processor and a memory. Further, the system 101 may be connected to user devices and business entities through a network 104 . It may be understood that the system 101 may be communicatively coupled with multiple users through one or more user devices 103 - 1 , 103 - 2 , 103 - 3 . . . , 103 - n and business entities 102 - 1 , 102 - 2 , 102 - 3 . . . , 102 - n collectively referred to as a user device 103 and business entity 102 .
- the network 104 may be a cellular communication network used by user devices 103 such as mobile phones, tablets, or a virtual device.
- the cellular communication network may be the Internet.
- the user device 103 may be any electronic device, communication device, image capturing device, machine, software, automated computer program, a robot or a combination thereof.
- the business entity 102 may be any networking platform, media platform, messaging platform, ecommerce platform, or any other application platform.
- the system 101 may be configured to register users as well as business entities over the system 101 . Further, the system may be configured to authenticate the user, each time the user makes a request to access the system 101 .
- the user devices 103 may support communication over one or more types of networks in accordance with the described embodiments.
- some user devices and networks may support communications over a Wide Area Network (WAN), the Internet, a telephone network (e.g., analog, digital, POTS, PSTN, ISDN, xDSL), a mobile telephone network (e.g., CDMA, GSM, NDAC, TDMA, E-TDMA, NAMPS, WCDMA, CDMA-2000, UMTS, 3G, 4G), a radio network, a television network, a cable network, an optical network (e.g., PON), a satellite network (e.g., VSAT), a packet-switched network, a circuit-switched network, a public network, a private network, and/or other wired or wireless communications network configured to carry data.
- WAN Wide Area Network
- the Internet a telephone network
- a mobile telephone network e.g., CDMA, GSM, NDAC, TDMA, E-TDMA
- the aforementioned user devices 103 and network 104 may support wireless local area network (WLAN) and/or wireless metropolitan area network (WMAN) data communications functionality in accordance with Institute of Electrical and Electronics Engineers (IEEE) standards, protocols, and variants such as IEEE 802.11 (“WiFi”), IEEE 802.16 (“WiMAX”), IEEE 802.20x (“Mobile-Fi”), and others.
- IEEE Institute of Electrical and Electronics Engineers
- the user devices 103 are enabled with biometric scanning capabilities. Furthermore, the user devices 103 are also enabled to maintain a distributed global people's registry.
- the Distributed Global People Registry may be an autonomous free public utility that stores the public-key of every registered person.
- the business entity 102 may be a networking platform, an ecommerce platform, or any other internet-based software application which requires user authentication before providing the user with access to the application.
- the user and business registration process is further illustrated with the block diagram in FIG. 2 .
- the system 101 may include at least one processor 201 and a memory 203 .
- the memory consists of a set of modules.
- the set of modules may include a user registration module 204 , a user authentication module 205 , and a business registration module 206 .
- the at least one processor 201 is configured to fetch and execute computer-readable instructions, stored in the memory 203 , corresponding to each module.
- the memory 203 may include any computer-readable medium known in the art including, for example, volatile memory, such as static random-access memory (SRAM) and dynamic random-access memory (DRAM), and/or non-volatile memory, such as read-only memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and memory cards.
- volatile memory such as static random-access memory (SRAM) and dynamic random-access memory (DRAM)
- DRAM dynamic random-access memory
- non-volatile memory such as read-only memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and memory cards.
- the programmed instructions 205 may include routines, programs, objects, components, data structures, etc., which perform particular tasks, functions, or implement particular abstract data types.
- the data 207 may comprise a data repository 208 , and other data 209 .
- the other data 209 amongst other things, serves as a repository for storing data processed, received, and generated by one or more components and programmed instructions. The working of the system 101 will now be described in detail referring to FIGS. 1 and 2 .
- the processor 201 may be configured for executing programmed instructions corresponding to user registration module 204 for registering a user over the system 101 .
- a user may send a request for registration to the system 101 from the user device 103 .
- the processor 201 may receive a set of biometric samples of the user, corresponding to one or more biometric factors.
- the one or more biometric factors may correspond to fingerprint, face, voice, retina, and palm vein. It must be understood that the one or more biometric factors are not limited only to fingerprint, face, voice, retina, and palm vein. Any other biometric factors which can uniquely identify a user may be collected from the user.
- the set of biometric samples may be captured by the user device 103 and sent to the system 101 for registration. Further, the processor 201 is configured to process the set of biometric samples to compute a Secret-Key (S 1 ) corresponding to the user. For the purpose of computing the Secret-Key (S 1 ) a set of unique characteristics of the biometric samples may be determined. These unique characteristics must be reproducible every time the user scans their biometrics. Further, the processor 201 is configured to generate a Unique-Number (N 1 ). The Unique-Number (N 1 ) can be computed using any random number generation algorithm known in the art. The Unique-Number (N 1 ) is a random number generated only once by the random number generation algorithm.
- the processor 201 is configured to apply a Function (F 1 ) to the Secret-Key (S 1 ) and the Unique-Number (N 1 ) to compute a Public-Key (P 1 ).
- the Function (F 1 ) may be based on Asymmetric Key Encryption which consumes the Secret-Key (S 1 ) and the Unique-Number (N 1 ) to compute a Public-Key (P 1 ).
- the Function (F 1 ) may be based on any other encryption technique that is known in the art.
- the processor 201 is configured for capturing a set of attributes and preferences of the user pertaining to a category of products associated with one or more business categories.
- the attributes associated with the user may comprise shoe size, shirt size, pant size, and the like.
- the preferences associated with the user may comprise food preferences, clothing preferences, game, music, movie, and the like. It must be understood that the attributes and preferences may change from person to person.
- the system 101 may enable a user interface in order to capture the set of attributes and preferences of the user.
- the processor 201 is configured to store the set of attributes and preferences, and the Unique-Number (N 1 ) on a peer-to-peer distributed hash-table. Further, the processor 201 is configured to store the Public-Key (P 1 ) of the user on the peer-to-peer distributed hash-table and on the user device 103 .
- the Distributed Global People Registry may be hosted on the peer-to-peer distributed hash-table.
- the user devices 103 may be enrolled as peers on the peer-to-peer distributed hash-table that hosts the Distributed Global People Registry.
- Distributed Global People Registry may be a distributed registry implemented using the technique disclosed in the public-domain publication entitled “Distributed Global People Registry” [https://www.tdcommons.org/dpubs_series/2286/].
- multiple users may be registered over the system 101 . Every time the user makes a request to access the system 101 , the Unique-Number (N 1 ) and the Public-Key (P 1 ) is used for authentication.
- the Secret-Key (S 1 ) is not stored on the user device 103 or the system 101 . Rather, at the time of authentication, a Secret-Key is computed in real-time. The process for user authentication is stated below.
- the processor 201 may be configured for executing programmed instructions corresponding to user authentication module 205 for authenticating the user.
- the processor 201 may execute programmed instructions stored in the memory for receiving a biometric sample from the user.
- the biometric sample may be captured from the user in real-time.
- the processor 201 may execute programmed instructions stored in the memory for processing the biometric sample to generate a Secret-Key (S 2 ). It must be noted that the Secret-Key (S 2 ) will be different from Secret-Key (S 1 ) if the user is not the same person.
- the processor 201 may execute programmed instructions stored in the memory for fetching the Public-Key (P 1 ) corresponding to the user from the user device 103 .
- the processor 201 may execute programmed instructions stored in the memory for computing a Real-Time-Unique-Number (N 2 ) using the Public-Key (P 1 ), the Secret-Key (S 2 ) and the Function (F 1 ). Furthermore, the processor 201 may execute programmed instructions stored in the memory for authenticating the user based on comparison of the Real-Time-Unique-Number (N 2 ) with the Unique-Number (N 1 ) stored on the user device 103 . It must be noted that when biometric samples from the same user are captured, the Secret-Key (S 2 ) which is generated in real-time is the same as the Secret-Key (S 1 ) which was used during user registration.
- the Real-Time-Unique-Number (N 2 ) generated using the Public-Key (P 1 ), the Secret-Key (S 2 ) and the Function (F 1 ) will be the same as the Unique-Number (N 1 ) stored in the peer-to-peer distributed hash-table.
- the Secret-Key (S 2 ) generated in real-time will not be the same as the Secret-Key (S 1 ). Due to this, the Real-Time-Unique-Number (N 2 ) will not be equal to the Unique-Number (N 1 ) and the authentication will fail. It must be noted that during the entire authentication process, the only connection established with the user is through biometric scanning.
- the processor 201 may execute programmed instructions stored in the memory for recommending to the user, a candidate product from a product catalog associated with a business entity, based on the set of attributes and preferences associated with the user.
- the process for registration of business entities is illustrated as below.
- the processor 201 may be configured for executing programmed instructions corresponding to the business registration module ( 206 ).
- the processor 201 may execute programmed instructions stored in the memory for receiving an account creation request from the business entity through the network 104 .
- the processor 201 may execute programmed instructions stored in the memory for assigning a visibility permission category to the business entity based on the business entity's service category.
- the visibility permission category is selected from anonymous, pseudonymous, or public-key visible.
- the processor 201 may execute programmed instructions stored in the memory for receiving the product catalog from the business entity.
- the processor 201 may execute programmed instructions stored in the memory for enabling the business entity to add a product promotion campaign corresponding to one or more products from the product catalog.
- the processor 201 may execute programmed instructions stored in the memory for providing an interface for the business entity to select attributes and preferences corresponding to the attributes and preferences of the target audience for one or more of the business entity's products.
- the processor 201 may execute programmed instructions stored in the memory for providing an interface for the business entity to configure settings to promote one or more products, wherein the settings correspond to budget, period of time, audience size, and other parameters associated with the product promotion campaign.
- the processor 201 may execute programmed instructions stored in the memory for displaying on an interface visited by the user, the candidate product from a product catalog, such that the candidate product is discoverable by the user. It must be noted that the candidate product is selected based on the matching of the set of attributes and preferences of the user with the corresponding set of attributes and preferences of the product's target audience. Further, the processor 201 may execute programmed instructions stored in the memory for providing on the interface visited by the user, a link using which the user can access and purchase the candidate product. It must be noted that during the entire process of identifying and displaying the candidate product from a product catalog, and displaying it on an interface visited by the user, the user does not reveal any personally identifiable information to the system or to the business entity. If the preferences match, the candidate product is displayed on an interface visited by the user. The method for sharing user preferences without having the user reveal their identity is further elaborated with the flowchart of FIG. 3 .
- FIG. 3 a method 300 for sharing user preferences, pertaining to one or more products, without having the user reveal their identity is illustrated, in accordance with an embodiment of the present subject matter.
- the processor 201 may be configured for registering a user over the system 101 .
- the detailed steps for registering a user over the system 101 are further elaborated with reference to FIG. 4 .
- the processor 201 may be configured for authenticating a user over the system 101 .
- the detailed steps for authenticating a user over the system 101 are further elaborated with reference to FIG. 5 .
- the processor 201 may be configured for registering a business entity over the system 101 .
- the steps for registering a business entity over the system 101 are further illustrated in FIG. 6 .
- the processor 201 may be configured to recommend to the user, a candidate product from a product catalog associated with a business entity.
- the steps for recommending to the user, a candidate product using the system 101 are further illustrated in FIG. 6 .
- FIG. 4 a method 400 for user registration is illustrated, in accordance with an embodiment of the present subject matter.
- the processor 201 may be configured for registering a user over the system 101 .
- a user may send a request for registration to the system 101 from the user device 103 .
- the processor 201 may receive a set of biometric samples of the user, corresponding to one or more biometric factors.
- the one or more biometric factors may correspond to fingerprint, face, voice, retina, and palm vein.
- the processor 201 may be configured to process the set of biometric samples to compute a Secret-Key (S 1 ) corresponding to the user.
- a Set of unique characteristics of the biometric samples may be determined. These unique characteristics must be reproducible every time the user scans their biometrics.
- the processor 201 may be configured to generate a Unique-Number (N 1 ).
- the Unique-Number (N 1 ) can be computed using any random number generation algorithm.
- the Unique-Number (N 1 ) is a random number generated only once by the random number generation algorithm.
- the processor 201 may be configured to apply a Function (F 1 ) to the Secret-Key (S 1 ) and the Unique-Number (N 1 ) to compute a Public-Key (P 1 ).
- the Function (F 1 ) may be based on Asymmetric Key Encryption which consumes the Secret-Key (S 1 ) and the Unique-Number (N 1 ) to compute a Public-Key (P 1 ).
- the processor 201 may be configured to capture a set of attributes and preferences of the user pertaining to a category of products associated with one or more business categories.
- the attributes associated with the user may comprise shoe size, shirt size, pant size, and the like.
- the preferences associated with the user may comprise food preferences, clothing preferences, game, music, movie, and the like. It must be understood that the attributes and preferences may change from person to person.
- the system 101 may enable a user interface in order to capture the set of attributes and preferences of the user.
- the processor 201 may be configured to store the Unique-Number (N 1 ) on the user device 103 and in a Data Repository 208 .
- the set of attributes and preferences are stored in the Data Repository 208 .
- the Public-Key (P 1 ) is stored on the user device 103 and in the Distributed Global People Registry.
- the Distributed Global People Registry is hosted on a peer-to-peer distributed hash-table.
- the user devices 103 may be enrolled as peers on the peer-to-peer distributed hash-table that hosts the Distributed Global People Registry. Further, multiple users may be registered over the system 101 .
- the Unique-Number (N 1 ) and the Public-Key (P 1 ) are used for authentication. It must be noted that the Secret-Key (S 1 ) is not stored on the user device 103 or the system 101 . Rather, at the time of authentication, the Secret-Key (S 2 ) is computed in real-time. The process for user authentication is stated below with reference to the flow chart of FIG. 5 .
- FIG. 5 a method 300 for user authentication is illustrated, in accordance with an embodiment of the present subject matter.
- the processor 201 may be configured to receive a biometric sample from the user.
- the biometric sample may be captured from the user in real-time.
- the processor 201 may be configured to process the biometric sample to generate a Secret-Key (S 2 ). It must be noted that the Secret-Key (S 2 ) will be different from Secret-Key (S 1 ) if the user is not the same person.
- the processor 201 may be configured to fetch the Public-Key (P 1 ) corresponding to the user from the user device 103 .
- the processor 201 may be configured to compute a Real-Time-Unique-Number (N 2 ) using the Public-Key (P 1 ), the Secret-Key (S 2 ) and the Function (F 1 ).
- the processor 201 may be configured to authenticate the user based on comparison of the Real-Time-Unique-Number (N 2 ) with the Unique-Number (N 1 ) stored on the user device 103 . It must be noted that when biometric samples from the same user are captured, the Secret-Key (S 2 ) generated in real-time is the same as the Secret-Key (S 1 ) that was generated during user registration. As a result, the Real-Time-Unique-Number (N 2 ) generated using the Public-Key (P 1 ), the Secret-Key (S 2 ) and the Function (F 1 ) will be the same as the Unique-Number (N 1 ) stored on the user device.
- the Secret-Key (S 2 ) generated in real-time will not be the same as the Secret-Key (S 1 ). Due to this, the Real-Time-Unique-Number (N 2 ) will not match the Unique-Number (N 1 ) and the authentication will fail. It must be noted that during the entire authentication process, the only connection established with the user is through biometric scanning. As a result, authentication fraud as well as duplicate account generation is prevented, while keeping the user's identity private, since there is no need for the user to share their phone number, email address, or any other personally identifiable information.
- the processor 201 may be configured to execute programmed instructions stored in the memory for recommending to the user, a candidate product from a product catalog associated with a business entity, based on the set of attributes and preferences associated with the user.
- the process for registration of business entities is illustrated as below with reference to the flowchart of FIG. 6 .
- FIG. 6 a method 600 for business registration and targeted product promotion without having the user reveal their identity is illustrated, in accordance with an embodiment of the present subject matter.
- the processor 201 may be configured to receive an account creation request from the business entity through the network 104 .
- the processor 201 may be configured to assign a visibility permission category to the business entity based on the business entity's service category.
- the visibility permission category may be categorized as anonymous, pseudonymous, or public-key visible. For instance, a business entity providing refueling services may be assigned anonymous visibility, a business entity providing concierge services may be assigned pseudonymous visibility, and a business entity providing merchant services may be assigned public-key visibility.
- the processor 201 may be configured to receive the product catalog from the business entity.
- the processor 201 may be configured for enabling the business entity to add a product promotion campaign corresponding to one or more products from the product catalog.
- the processor 201 may provide an interface for the business entity to select attributes and preferences corresponding to the attributes and preferences of a target audience for one or more of the business entity's products.
- the processor 201 may provide an interface for the business entity to configure settings to promote one or more products. The settings may correspond to budget, period of time, audience size, and other parameters associated with the product promotion campaign.
- the processor 201 may be configured to display on an interface visited by the user, the candidate product from the product catalog, such that the candidate product is discoverable by the user. It must be noted that the candidate product is selected based on matching the set of attributes and preferences of the user with the corresponding set of attributes and preferences of the product's target audience.
- the processor 201 may be configured to provide a link on the interface visited by the user. Using this link, the user can access and purchase the candidate product. It must be noted that during the entire process of identifying the candidate product from the product catalog and displaying it on an interface visited by the user, the user does not reveal any personally identifiable information to the system or to the business entity. If the preferences match, the candidate product is displayed on an interface visited by the user.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computational Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Pure & Applied Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
Claims (11)
Priority Applications (11)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/018,273 US11582032B2 (en) | 2019-09-25 | 2020-09-11 | System and method for sharing user preferences without having the user reveal their identity |
US17/481,474 US12079367B2 (en) | 2019-09-25 | 2021-09-22 | System and method for enabling social network users to grant their connections granular visibility into their personal data without granting the same visibility to the network operator |
US17/481,465 US12026247B2 (en) | 2019-09-25 | 2021-09-22 | System and method for enabling a user to create an account on an application or login into the application without having the user reveal their identity |
US17/481,478 US12028347B2 (en) | 2019-09-25 | 2021-09-22 | System and method for enabling a user to obtain authenticated access to an application using a biometric combination lock |
US17/481,468 US12072963B2 (en) | 2019-09-25 | 2021-09-22 | System and method for affixing a signature using biometric authentication |
US18/783,017 US20240378318A1 (en) | 2019-09-25 | 2024-07-24 | System and method for managing tokenized personally identifiable information |
US18/782,801 US20240380598A1 (en) | 2019-09-25 | 2024-07-24 | System and method for managing an operating system using tokenized identity |
US19/050,175 US20250182120A1 (en) | 2019-09-25 | 2025-02-11 | System and method for creating and managing interactive transaction frameworks |
US19/050,154 US20250184149A1 (en) | 2019-09-25 | 2025-02-11 | System and method for privacy-preserving event attendance recording |
US19/050,160 US20250184129A1 (en) | 2019-09-25 | 2025-02-11 | System and method for generating hidden biometrics-based passwords |
US19/050,149 US20250182553A1 (en) | 2019-09-25 | 2025-02-11 | System and method for anonymized authenticated voting |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201962906080P | 2019-09-25 | 2019-09-25 | |
US201962954591P | 2019-12-29 | 2019-12-29 | |
US202063029717P | 2020-05-26 | 2020-05-26 | |
US17/018,273 US11582032B2 (en) | 2019-09-25 | 2020-09-11 | System and method for sharing user preferences without having the user reveal their identity |
Related Child Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/481,465 Continuation-In-Part US12026247B2 (en) | 2019-09-25 | 2021-09-22 | System and method for enabling a user to create an account on an application or login into the application without having the user reveal their identity |
US17/481,474 Continuation-In-Part US12079367B2 (en) | 2019-09-25 | 2021-09-22 | System and method for enabling social network users to grant their connections granular visibility into their personal data without granting the same visibility to the network operator |
US17/481,468 Continuation-In-Part US12072963B2 (en) | 2019-09-25 | 2021-09-22 | System and method for affixing a signature using biometric authentication |
US17/481,478 Continuation-In-Part US12028347B2 (en) | 2019-09-25 | 2021-09-22 | System and method for enabling a user to obtain authenticated access to an application using a biometric combination lock |
Publications (2)
Publication Number | Publication Date |
---|---|
US20210091937A1 US20210091937A1 (en) | 2021-03-25 |
US11582032B2 true US11582032B2 (en) | 2023-02-14 |
Family
ID=74881316
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/018,273 Active 2041-04-22 US11582032B2 (en) | 2019-09-25 | 2020-09-11 | System and method for sharing user preferences without having the user reveal their identity |
Country Status (1)
Country | Link |
---|---|
US (1) | US11582032B2 (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12072963B2 (en) | 2019-09-25 | 2024-08-27 | Amod Ashok Dange | System and method for affixing a signature using biometric authentication |
US12028347B2 (en) | 2019-09-25 | 2024-07-02 | Amod Ashok Dange | System and method for enabling a user to obtain authenticated access to an application using a biometric combination lock |
US12026247B2 (en) | 2019-09-25 | 2024-07-02 | Amod Ashok Dange | System and method for enabling a user to create an account on an application or login into the application without having the user reveal their identity |
US12079367B2 (en) | 2019-09-25 | 2024-09-03 | Amod Ashok Dange | System and method for enabling social network users to grant their connections granular visibility into their personal data without granting the same visibility to the network operator |
WO2022265915A1 (en) * | 2021-06-14 | 2022-12-22 | Alexion Pharmaceuticals, Inc. | Dosage and administration of anti-c5 antibodies for treating dermatomyositis (dm) |
US12099588B2 (en) | 2021-12-31 | 2024-09-24 | Amod Ashok Dange | System and method for concealing information associated with a physical mail package |
Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030028451A1 (en) * | 2001-08-03 | 2003-02-06 | Ananian John Allen | Personalized interactive digital catalog profiling |
US7340438B2 (en) | 2001-05-21 | 2008-03-04 | Nokia Corporation | Method and apparatus for managing and enforcing user privacy |
US20080072068A1 (en) * | 2006-09-19 | 2008-03-20 | Wang Liang-Yun | Methods and apparatuses for securing firmware image download and storage by distribution protection |
US7496191B1 (en) | 2003-12-17 | 2009-02-24 | Sprint Communications Company L.P. | Integrated privacy rules engine and application |
US20090271634A1 (en) * | 2008-04-25 | 2009-10-29 | The Regents Of The University Of Colorado & Securics, Inc. | Bio-Cryptograhpy : Secure cryptographic protocols with bipartite biotokens |
US7769633B2 (en) | 2001-01-18 | 2010-08-03 | Nokia Corporation | Real-time wireless e-coupon (promotion) definition based on available segment |
JP4675660B2 (en) | 2005-03-29 | 2011-04-27 | 富士通株式会社 | Multiple simultaneous biometrics authentication device |
US8170615B2 (en) | 2002-06-17 | 2012-05-01 | Nokia Corporation | Method and device for storing and accessing personal information |
JP2014127164A (en) | 2012-12-27 | 2014-07-07 | Fujitsu Ltd | Multiple biometric authentication device, multiple biometric authentication system, and multiple biometric authentication program |
US20150006895A1 (en) * | 2009-06-01 | 2015-01-01 | Maidsafe Foundation | Distributed network system |
US9633269B2 (en) | 2014-09-05 | 2017-04-25 | Qualcomm Incorporated | Image-based liveness detection for ultrasonic fingerprints |
US20170141920A1 (en) * | 2015-11-13 | 2017-05-18 | Charles H. Herder, III | Public/Private Key Biometric Authentication System |
US20180307859A1 (en) * | 2013-11-01 | 2018-10-25 | Anonos Inc. | Systems and methods for enforcing centralized privacy controls in de-centralized systems |
US10136191B1 (en) * | 2016-12-12 | 2018-11-20 | Google Llc | Methods, systems, and media for recommending media content based on attribute grouped viewing sessions |
US10489826B2 (en) | 2016-12-27 | 2019-11-26 | Rovi Guides, Inc. | Systems and methods for submitting user selected profile information to an advertiser |
US10530577B1 (en) * | 2019-02-08 | 2020-01-07 | Talenting, Inc. | Systems and methods for biometric key generation in data access control, data verification, and path selection in block chain-linked workforce data management |
US20200204545A1 (en) | 2018-12-21 | 2020-06-25 | Oath Inc. | Method and system for secure information validation |
US20200266989A1 (en) * | 2017-11-09 | 2020-08-20 | Electric Society Sa | An ad-hoc network |
-
2020
- 2020-09-11 US US17/018,273 patent/US11582032B2/en active Active
Patent Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7769633B2 (en) | 2001-01-18 | 2010-08-03 | Nokia Corporation | Real-time wireless e-coupon (promotion) definition based on available segment |
US7340438B2 (en) | 2001-05-21 | 2008-03-04 | Nokia Corporation | Method and apparatus for managing and enforcing user privacy |
US20030028451A1 (en) * | 2001-08-03 | 2003-02-06 | Ananian John Allen | Personalized interactive digital catalog profiling |
US7013290B2 (en) * | 2001-08-03 | 2006-03-14 | John Allen Ananian | Personalized interactive digital catalog profiling |
US8170615B2 (en) | 2002-06-17 | 2012-05-01 | Nokia Corporation | Method and device for storing and accessing personal information |
US7496191B1 (en) | 2003-12-17 | 2009-02-24 | Sprint Communications Company L.P. | Integrated privacy rules engine and application |
JP4675660B2 (en) | 2005-03-29 | 2011-04-27 | 富士通株式会社 | Multiple simultaneous biometrics authentication device |
US20080072068A1 (en) * | 2006-09-19 | 2008-03-20 | Wang Liang-Yun | Methods and apparatuses for securing firmware image download and storage by distribution protection |
US20090271634A1 (en) * | 2008-04-25 | 2009-10-29 | The Regents Of The University Of Colorado & Securics, Inc. | Bio-Cryptograhpy : Secure cryptographic protocols with bipartite biotokens |
US20150006895A1 (en) * | 2009-06-01 | 2015-01-01 | Maidsafe Foundation | Distributed network system |
JP2014127164A (en) | 2012-12-27 | 2014-07-07 | Fujitsu Ltd | Multiple biometric authentication device, multiple biometric authentication system, and multiple biometric authentication program |
US20180307859A1 (en) * | 2013-11-01 | 2018-10-25 | Anonos Inc. | Systems and methods for enforcing centralized privacy controls in de-centralized systems |
US9633269B2 (en) | 2014-09-05 | 2017-04-25 | Qualcomm Incorporated | Image-based liveness detection for ultrasonic fingerprints |
US20170141920A1 (en) * | 2015-11-13 | 2017-05-18 | Charles H. Herder, III | Public/Private Key Biometric Authentication System |
US10136191B1 (en) * | 2016-12-12 | 2018-11-20 | Google Llc | Methods, systems, and media for recommending media content based on attribute grouped viewing sessions |
US11252479B2 (en) * | 2016-12-12 | 2022-02-15 | Google Llc | Methods, systems, and media for recommending media content based on attribute grouped viewing sessions |
US10489826B2 (en) | 2016-12-27 | 2019-11-26 | Rovi Guides, Inc. | Systems and methods for submitting user selected profile information to an advertiser |
US20200266989A1 (en) * | 2017-11-09 | 2020-08-20 | Electric Society Sa | An ad-hoc network |
US20200204545A1 (en) | 2018-12-21 | 2020-06-25 | Oath Inc. | Method and system for secure information validation |
US10530577B1 (en) * | 2019-02-08 | 2020-01-07 | Talenting, Inc. | Systems and methods for biometric key generation in data access control, data verification, and path selection in block chain-linked workforce data management |
Non-Patent Citations (6)
Title |
---|
"Face Liveness Detection For Safe Biometric Authentication And Face Recognition", Banuba, 2020, pp. 1-9. |
Bendik B. Mjaaland et al.; Norwegian University of Science and Technology "Biocryptics: Towards Robust Biometric Public/Private Key Generation", NISK, 2009, pp. 27-42. |
Bon K. Sy; Arun P. Kumara Krishnan. "Generation of Cryptographic Keys from Personal Biometrics: An Illustration Based on Fingerprints.", Intech, 2012, pp. 191-218. |
Matt Kapko; Matthew Finnegan "What is Windows Hello? Microsoft's biometrics security system explained", Microsoft Docs, 2020, pp. 1-4. |
Reinhard Hochrieser "Online Dating Can Benefit From Identity Verification And Biometric Authentication In 2019", www.informationsecuritybuzz.com, Jul. 18, 2019, All Pages. |
Sayani Chandra et al., "Generate an Encryption Key by using Biometric Cryptosystems to secure transferring of Data over a Network", IOSR Journal of Computer Engineering, 2013, pp. 16-22. |
Also Published As
Publication number | Publication date |
---|---|
US20210091937A1 (en) | 2021-03-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11582032B2 (en) | System and method for sharing user preferences without having the user reveal their identity | |
US10693885B2 (en) | Social networking behavior-based identity system | |
Papadopoulos et al. | Cookie synchronization: Everything you always wanted to know but were afraid to ask | |
US12231415B2 (en) | Non-repeatable challenge-response authentication | |
US12072963B2 (en) | System and method for affixing a signature using biometric authentication | |
US12026247B2 (en) | System and method for enabling a user to create an account on an application or login into the application without having the user reveal their identity | |
US10496263B2 (en) | De-anonymization of website visitor identity | |
US12079367B2 (en) | System and method for enabling social network users to grant their connections granular visibility into their personal data without granting the same visibility to the network operator | |
US12028347B2 (en) | System and method for enabling a user to obtain authenticated access to an application using a biometric combination lock | |
US20220279067A1 (en) | Systems and methods for automatically authenticating communications with a calling device | |
US9628484B2 (en) | Leveraging online identities to grant access to private networks | |
US9584578B2 (en) | Cross platform user joining | |
US8874639B2 (en) | Determining advertising effectiveness outside of a social networking system | |
US8910251B2 (en) | Using social information for authenticating a user session | |
US20170201518A1 (en) | Method and system for real-time authentication of user access to a resource | |
US20160358210A1 (en) | Authenticated registration of participants for web access at live events | |
RU2670031C2 (en) | System and method of identification and / or authentication | |
JP2019503533A5 (en) | ||
US11889018B2 (en) | Systems and methods for providing context data associated with a communications session to the called device | |
EP3788770B1 (en) | System and method of creating provisional account profiles | |
US20240320696A1 (en) | System and method for conducting anonymous intelligent surveys | |
US11481462B2 (en) | System and method for generating a content network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: APPLICATION DISPATCHED FROM PREEXAM, NOT YET DOCKETED |
|
AS | Assignment |
Owner name: DANGE, AMOD ASHOK, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MODY, YASH;REEL/FRAME:056698/0337 Effective date: 20210224 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |